Resources
Browse our library of white papers, webinars, case studies, product briefs, and more.
-
Ping Identity | EO 14028 compliance – Yubico Learn how YubiKey and Ping Identity together offer phishing-resistant MFA to protect against account takeovers within government agencies Read more -
WebAuthn Explained: Advancing Authentication with Hardware Security Keys & Establishing a Root of Trust – Yubico Insights Establishing a “root of trust” is the mechanism in which a user recovers an account or establishes their identity on a new device Read more -
One northeastern U.S. state secured elections using MFA Election security is an increasing concern. One Northeastern state adopted mfa using hardware security keys to protect its voters Read more -
Protecting the supply chain with modern security Learn how Yubico solutions can help you secure your software supply chain, ensure IP security and product integrity, and provide highest-assurance security Read more -
Securing energy and natural resources against modern cyber threats Learn the critical need for phishing-resistant multi-factor authentication to safeguard this critical infrastructure and authentication best practices to close the critical threat gap that emerges from legacy authentication. Read more -
How governments and higher education can achieve 100% MFA Learn how state and local governments and higher education can drive 100 percent MFA coverage to protect against phishing and account takeovers Read more -
Strong phishing resistant MFA for EO compliance Learn how you can achieve federal compliance with YubiKeys and Microsoft Read more -
Phishing-resistant MFA for Telecoms Learn how the YubiKey can bolster existing security approaches by providing a future-proof layer of protection to safeguard people, technology, and data. Read more -
AWS Marketplace Yubico Partner Brief Learn how YubiKeys work to secure your AWS services and resources. Read more